Topology Control and Routing over Wireless Optical Backbone Networks*

Size: px
Start display at page:

Download "Topology Control and Routing over Wireless Optical Backbone Networks*"

Transcription

1 Topology Control and Routing over Wireless Optical Backbone Networks* Abhishek Kashyap, Samir Khuller and Mark Shayman Institute for Systems Research Department of Electrical and Computer Engineering University of Maryland, College Park {kashyap, Department of Computer Science University of Maryland, College Park Abstract The problem of topology control and routing over wireless optical backbone networks is addressed. The input to the problem is a potential topology and a traffic profile. The constraints are that of limited interfaces at each node and the limited bandwidth of the links, and the objective is of maximizing the throughput. The problem turns out to be NP-Hard, and we propose some heuristics based on graph modelling and multicommodity flow algorithms to solve the problem. We also enhance the heuristics to try and provide fairness to the ingress-egress pairs in terms of how much traffic we route for each of them. I. INTRODUCTION We consider the problem of topology control in wireless optical backbone networks, taking the estimated traffic into consideration. Our aim is to maximize the throughput over the topology for a given estimate of the traffic. We prove the problem to be NP-Hard, and then propose heuristics to achieve the goal. We also propose a scheme to provide fairness to the traffic routed between different ingress-egress pairs. We consider wireless optical links because of their attractive characteristics which make them more suitable for backbone networks (compared to using RF and wireline optical links). Free-space optics technology is expected to deliver unprecedented bandwidth, massive carrier reuse, ultralow inter-channel interference, low power consumption, and cost savings where electrical wires and optical fibers are too expensive to deploy and maintain [1]. A key distinguishing feature of wireless optical networks is that the links are pointto-point rather than broadcast. Also, it has wide applicability from long range satellite to indoor wireless communications. The problem of topology control for wireless optical networks is different from that in wireless RF (radio frequency) networks since the links are point-to-point as opposed to broadcast. In wireless optical networks, each node has a limited number of transceivers, and hence can establish links with only a limited number of nodes within its transmission range. Thus, topology control is concerned with determining the neighbors with which to establish the limited number of *This research was partially supported by AFOSR under grant F possible links. In wireless networks, most research for topology control so far has focused on RF networks (see e.g., [10], [11], [16], [17], [18], [19], [20]). In RF-wireless networks with isotropic antennas, topology control is closely related to power control. Power is controlled to reduce the transmission range to conserve power and decrease interference while providing adequate connectivity. There are important differences between topology control for reconfigurable wireline optical networks and topology control for wireless optical networks. In the wireline case, transmission range (lightpath length) is not a major issue. Furthermore, if the optical layer has sufficient resources so the routing and wavelength assignment problem is always solvable, then whenever a source and destination both have available interfaces, a direct connection (one logical hop) can be established. In contrast, in the wireless case, unless the destination is within the transmission range of the source, a multihop connection is required. For these reasons, the many published results on logical topology design for wireline optical networks, [12], [13], [14], [15], are not directly applicable to free-space optical networks. There has been recent work on topology control in wireless optical networks ([4], [5]): [5] does not take traffic into consideration, while [4] considers only ring topologies. The work presented in [6] proposes a framework and some heuristics for topology control and routing which take potential traffic into consideration, and we compare our algorithms with those heuristics. The algorithms presented in this paper have a lower time complexity than the algorithms proposed in [6]. We also extend the algorithms proposed in [6] to allow for splitting the traffic as a commodity using multi-commodity flow formulation. The heuristics we propose take as input a potential topology and the estimated aggregate traffic between the ingress-egress pairs (which we call the traffic profile). Each node is assumed to have a constraint on the number of interfaces it can have, and hence on the number of actual links that can be created from among the potential links. The decision of selecting the links to be formed is made on the basis of evaluating the total bandwidth guarantees (which we call throughput) we

2 can give for the given traffic profile. The traffic profile can be measured over some previous operation of the network or can be had from service level agreements (SLAs). We use matching theory, [9] along with the formulation of routing as a multi-commodity flow problem to calculate the topology and bandwidth reservations for the ingress-egress pairs. The bandwidth reservations calculated can be used for routing and admission control when the network is formed. The advantages of computing the bandwidth reservations offline and using that information for routing and exercising admission control can be found in [3]. The paper is organized as follows: Section 2 describes the network model and gives the problem statement. Section 3 explains the policies we compare the algorithms with. Section 4 explains our algorithm. Section 5 gives the extension to achieve fairness. Section 6 discusses the computational complexity and presents the simulation results. II. NETWORK MODEL AND PROBLEM DEFINITION We model the network as a graph G = (V,E), where V is the set of nodes and E is the set of potential links between them. We consider wireless backbone networks in which each wireless node is equipped with point-to-point wireless optical interfaces. By the term node we implicitly mean backbone node. Each node has the capability to perform routing. We assume that it does not move very frequently. We also assume that wireless links can be set up in any direction with all the nodes within the transmission range. We do not consider the possibility of optical beam obscuration, but this assumption is not essential. Since the transmission distance is related to the power level of the node, the power level and thus the transmission range of each node can be different. The wireless links are unidirectional. If there is a pair of unidirectional links between two nodes, the link capacities may differ. The number of transmitters and receivers at each node is limited (which we call an interface constraint), thereby restricting the number of nodes to which it can connect. We have a traffic profile, which consists of the aggregate traffic demands between the sources and destinations. The traffic demand from node x to node y can be different from the traffic demand from node y to node x. The problem we address is to form a subgraph G = (V,E ), such that the interface constraints are satisfied for all nodes in the set V (i.e., the degree of each node is bounded by the number of available interfaces), and we maximize the throughput considering the traffic profile. The algorithm forms this subgraph, which we call topology control, and comes up with routes and bandwidth reservations for the ingressegress pairs given in the traffic profile. The server should recompute the topology, routes and bandwidth reservations whenever either the traffic profile or the (backbone) node locations change significantly. We do not anticipate that this would be done more often than hourly. The nodes then use this information to perform routing and traffic engineering on incoming flows. We provide a proof that the problem of topology control is NP-Hard: Consider a small amount of traffic between each pair of nodes in the network (small enough not to violate any capacity constraints). The problem of maximizing the throughput reduces to finding a connected subgraph here. We can remove the extra edges and the problem reduces to finding a degree-constrained spanning tree, which is a known NP-Hard problem. A special case is where we have a degree constraint of 1 incoming and 1 outgoing edge on each node. In this case, the problem reduces to finding a hamiltonian cycle, which is known to be NP-Complete [7]. A. Routing as Multi-commodity flow problem We set up the problem of routing a given traffic profile over a computed topology for maximizing the throughput as a linear multi-commodity flow problem [3]. Let there be M commodities (profile entries, the value of each entry is prof ile(i)), N nodes and L links in the network. We add a dummy link (infinite cost, infinite capacity) between the source and destination of each commodity to achieve feasibility (thus, there are M such links). Let x i (l) be the amount of commodity i routed through link l. Let cost(l) represent the cost of each link, which is 1 for an actual link for our objective of maximizing the throughput. Let the set of incoming and outgoing links at node j be denoted by in j and out j respectively. Let source i and dest i represent the source and destination of profile i. Equation 1 achieves the objective of maximizing the throughput as the algorithm tries to route on the actual links due to large cost of the dummy links. Equation 2 represents the bandwidth constraints. Equations 3 and 4 represent the flow conservation laws. minimize L+M l=1 (cost(l) M x i (l)) (1) i=1 M x i (l) capacity(l) l {1,..,L} (2) i=1 l in j x i (l) = l out j x i (l) j {1,..,N} {source i,dest i }, i {1,..,M} (3) l out j x i (l) l in j x i (l) = profile(i), j = source i, i {1,..,M} (4) III. ROLLOUT ALGORITHMS We present a brief description of some rollout algorithms and their heuristic proposed in [6]. The heuristic takes a traffic profile and sorts it in decreasing order of demands. For each entry of the profile in that order, it finds a single constrained shortest path between the source and the destination, forms that path (finalizes the links of that path) in the topology (if

3 one exists which can accommodate all the demand of this entry), deletes the links violating the interface constraints in this partial topology, and updates the capacity of the links of this shortest path by decreasing by the value of this profile entry. A. Route Rollout This technique is an improvement over the heuristic, and is guaranteed to work at least as good as the heuristic in terms of the objective function (throughput). It starts with a sorted traffic profile (in decreasing order). At stage i, it finds K constrained shortest paths for profile entry i, and starting with each of those paths (i.e., temporarily finalizing the links in that path), it forms the complete topology using the heuristic. The path which gives the maximum throughput (total demand routed) is chosen (i.e., links finalized, potential links violating interface constraints deleted and residual bandwidths updated to reflect the demand routed), and the algorithm advances to the next stage. B. Index Rollout This technique decides the order in which the profile entries should be routed to get maximum throughput. At each stage, it uses the heuristic to form the complete topology starting from each of the unrouted profile entries (and sorting the remaining unrouted entries in decreasing order), and calculates the throughput in each case. It selects the profile entry which gives the maximum throughput, and finalizes the links for its shortest path, along with updating the residual bandwidths and deleting links violating the interface constraints. C. Integrated Rollout This rollout takes into consideration both the index and the routes. Unlike index rollout, at each stage, it finds K constrained shortest paths for each of the unrouted entries, and for each case, it uses the heuristic to route the rest of the unrouted profile entries. The profile entry (and the corresponding path) giving the maximum throughput is chosen and those links finalized, and the algorithm advances to next stage. In all the above cases, we are routing the whole profile entry over a single path (and not routing it at all if we are not able to route it all over one path). As an improvement, we can split the traffic linearly by applying the multi-commodity flow algorithm over the topology computed by these (as explained in Section 2) and get a better throughput. IV. APPLICATION OF MATCHING THEORY Here we present a new algorithm to form the topology and route the traffic profiles. The algorithm is outlined below and explained in the following subsections. 1) Weight the links in the initial graph to favor the links which are expected to have a higher traffic flow. 2) Map the network to one which can be given as an input to a maximum weight matching problem, [9] and solve the matching problem to get a maximum weight subgraph which satisfies the interface constraints. 3) Solve the multi-commodity flow problem over this topology. 4) Modify the topology sequentially and solve the multicommodity flow problem again each time, and finally, keep the topology which gives the maximum throughput. A. Giving Initial Weight to Edges The way we map the problem to maximum weight matching problem, if we give the same weight to all the links in the network, the output topology will have the maximum number of links while satisfying the degree constraints (as we try to maximize the weight during maximum weight matching, so same weight to all edges would result in maximizing the number of edges). We call the algorithm using this policy as Uniform Weighted Matching (UWM). As our objective is maximizing the throughput, so it is better to give extra weight to edges which are expected to carry more traffic. We call the algorithm using this policy as Traffic Weighted Matching (TWM), and explain it below. Give a weight of 1 to all edges. Find K shortest paths (maximum) of same length for each traffic profile (over the potential topology). Each time a link comes in a path, add to its weight prof ile(i)/numbersp, where prof ile(i) is the value of the profile entry, and numbersp the number of shortest paths we found for that profile entry. Another possibility is to give weights according to the number of paths a link comes on irrespective of the amount of traffic. In this case, we add 1 to the weight of a link in step 3 above. We called the algorithm using this strategy as Flow Weighted Matching. We work with shortest paths as the multi-commodity flow formulation will prefer shorter paths for a commodity because it minimizes the cost function of Equation 1 (to maximize the throughput). B. Mapping to Maximum Weight Matching Given a graph G = (V,E) (which corresponds to the potential network) with edge weights as explained in subsection A, we form a graph G = (V,E ) and give it as an input to the maximum weight matching problem. Let the number of transmit and receive interfaces (i.e., input and output degree constraints) at each vertex be. Figure 1 shows an example potential topology with = 2. The steps of mapping are explained below. For each vertex, we form 2 vertices in graph G ( of them correspond to the transmit interfaces, and to receive interfaces). For each edge between two vertices in G, we form two vertices in G, and add an edge between them (of weight 0), as well as between one of them and the transmit interface vertices (all of them) of the vertex it was going out of (with weight equal to the weight of the corresponding edge in G). Also add edges between the other vertex (in G ) of this edge (from G) and the receive interface vertices of the vertex it was incident on (with weight equal to the weight of the corresponding edge

4 Fig. 5. Connection between vertices undecidable Fig. 1. Potential Topology, = 2 Fig. 6. Result of Matching Algorithm Fig. 2. Modified graph from potential topology in G). The resulting graph for our example is shown in Figure 2 (the edges shown without weights have a weight of 1 here). T, R and E refer to the vertices corresponding to transmit interfaces, receive interfaces and edges in G respectively. Add a clique with 2 N vertices to the graph G, with each edge in the clique having a weight 0. Add 0 weight edges between each of these vertices and each of the vertices in G which correspond to the transmit and receive interfaces of the vertices in graph G. Sum the weight of all the edges in G and add that to the weight of all edges in G. We do this to make sure we get a perfect matching using a maximum weight matching algorithm. We solve the maximum weight matching problem on G, and deduce the resulting topology based on the result we get. We show the rules for mapping from the output of matching to the graph representing the topology: Figure 3 shows the scenario (a subgraph from the output of matching algorithm) when two vertices will have an edge between them in the final topology. Figure 4 shows the case when two vertices which had an edge between them in G will not have the edge in the resulting topology (as they are not connected to the edge vertices corresponding to the edge between them). We detect such subgraphs in the output graph from matching algorithm (the output graph will be composed of such subgraphs only), and use these rules to deduce the resulting topology. We added a clique to the graph G to avoid the scenario in which we cannot deduce the topology from the result of the matching algorithm. Figure 5 shows the case when this has happened between two vertices. In this case, one of the vertices connects to the edge vertex in G, while the other vertex does not connect with the corresponding edge vertex. This can be avoided by having perfect matching, and for achieving that we add a clique of size 2 N and connect each of them to all the vertices in G which correspond to transmit and receive interfaces of vertices in G. We accommodate the worst case in which all the vertices will be disconnected in the final topology. Figure 6 shows the output (minus the clique vertices and corresponding edges) of the matching algorithm and Figure 7 shows the final topology we get for the example network of Figure 1. C. Topology Change Strategy We solve the multi-commodity flow problem (as explained in Section 2) on the topology we get from the algorithm explained in Section 4.B. We sequentially change this topology and solve the multi-commodity flow problem on the resulting topologies to get an improvement in the throughput. The algorithm for changing the topology is as explained below: Fig. 3. Vertices are connected Fig. 4. Vertices are not connected Fig. 7. Final Topology

5 Make a list of the profile entries for which we could route less than x% of the demand in decreasing order of demand. For the first entry in this list, find (maximum) K shortest paths each in the potential topology and the current topology. Form the first path which is present in the potential topology, but not in the current topology by deleting the least loaded links (with traffic as given by the result of multi-commodity flow problem) at each of the interface-starved nodes in the current topology on this path. If all the paths are the same then repeat this step for the next entry in the list. Solve the multi-commodity flow problem for this changed topology. If the throughput is more than the throughput in the current topology then change the current topology to this topology and update the list by deleting the entries for which we have routed more than x% on this topology. If the throughput is less than before, then let the current topology remain the same and start with step 2 for the next entry in the list. We finally keep the topology we have at the end of this procedure. V. INCORPORATING FAIRNESS In all the algorithms we have seen so far, we do not consider fairness i.e., trying to route at least a certain fraction of each profile entry while maximizing the throughput. We address this problem by making changes to the multi-commodity flow formulation. We use two different weighting strategies for comparison: Fairness1: Use Traffic Weighted Matching. Fairness2: Use Flow Weighted Matching. This strategy is expected to be more fair than Fairness1. A. Multi-commodity Flow Formulation The primary change from the formulation explained before is the addition of the fairness constraint of Equation 5. Here, we sum the outgoing and incoming flows only over the actual links (and not over the (infinite capacity, infinite cost) links we added between the source and destination, as the traffic flowing over them is what we could not route). We also change the flow conservation law at intermediate nodes (of Equation 3) to include only the actual links adjacent to those nodes (Equation 6). Here, ain j denotes the actual incoming links at node j, and aout j denotes the actual outgoing links at j. This is done to make sure the traffic for a profile entry is not routed through the extra links between some nodes other than the source and destination of this profile entry (otherwise that will happen as the algorithm tries to force the condition of Equation 5). l aout j x i (l) l ain j x i (l) y profile(i), j = source i, i {1,..,M} (5) l ain j x i (l) = l aout j x i (l), j {1,..,N} {source i,dest i }, i {1,..,M} (6) This formulation will give an infeasible result if it is not able to route at least fraction y of each profile entry. We follow the following procedure to get the routes (and reservations) for the topology we get from the matching algorithm: Start at y = 0.95 and solve the changed multi-commodity flow problem. If it returns a feasible result, keep the current topology and these routes (and reservations) and exit. Else, decrease y by 0.05, and solve the problem again. If we get the answer at y = 0, then the answer is the same as what we get at the first step of the algorithm explained in Section 4. VI. SIMULATION AND COMPUTATIONAL ANALYSIS A. Computational Complexity The proposed algorithms take O(N 4 logn) time, with N being the number of nodes in the network. This complexity is much lower than that for route rollout (O(N 6 )) and index and integrated rollout algorithms (O(N 8 )). The heuristic used by these rollout algorithms takes O(N 4 ) time. B. Simulation Results The network used for simulations was assumed to have the following parameters: Number of nodes in the network = 20. This represents a reasonably sized backbone network. Nodes are uniformly distributed, with each node having an average of 6.5 potential neighbors. The transmission range of all nodes is assumed to be the same. Capacity of each link = 100 in each direction. Number of source-destination pairs = 160, chosen randomly. Aggregate traffic between each pair: Uniformly distributed between 1 and 40 units. Number of receive interfaces at each node = 3. Number of transmit interfaces at each node = 3. Threshold, x, for including a profile in the sequential topology change list = 20%. Number of shortest paths considered in Route Rollout and Integrated Rollout = 4. Number of shortest paths considered for initial weighting and sequential topology change, K = 3. Weight of each link for constrained shortest path computation = 1, thus making the shortest path as the constrained min-hop path. The simulation was run on a different random network and random profile 10 times and in each simulation, the network topology was formed starting with these parameters. The simulations were run for the heuristic and rollout algorithms described in [6], both with and without following it with

6 TABLE I AVERAGE THROUGHPUT FOR ROLLOUT ALGORITHMS TABLE V AVERAGE MINIMUM ROUTED FOR FAIRNESS SCHEMES Heuristic Route Rollout Index Rollout Integrated Rollout Fairness1 Fairness TABLE II AVERAGE THROUGHPUT FOR ROLLOUT ALGORITHMS WITH TRAFFIC SPLITTING Heuristic Route Rollout Index Rollout Integrated Rollout solving multi-commodity flow problem for routing. Tables I and II show the average fractional throughput for the rollout algorithms and their heuristic for the case where we do not split the traffic and the case where we split the traffic as a commodity respectively. As can be seen, splitting the traffic increases the throughput considerably. Table III shows the average throughput for the proposed algorithms. The matching algorithm used was an implementation of H. Gabow s N-cubed weighted matching algorithm [21]. As we can see, the algorithm with Traffic Weighted Matching (TWM) works the best, followed by Flow Weighted Matching (FWM), Uniform Weighted Matching (UWM) and the fairness schemes. Traffic Weighted Matching works 8.88% better than the heuristic for rollout and 2.25% better than the integrated rollout (with the proposed traffic splitting strategy). Table IV shows the average throughput we get in the proposed algorithms without using the sequential topology change strategy. As can be seen by comparing Tables III and IV, the improvement in throughput is the maximum in Uniform Weighted Matching followed by Flow Weighted Matching and Traffic Weighted Matching. This, along with the results of Table III, shows that Traffic Weighted Matching works the best among these three strategies. The metric we use to evaluate fairness is the minimum of the fraction of the demand routed for each profile entry. Table V shows the average of this parameter over the simulations. Fairness2 is more fair (0.53) than Fairness1 (0.425) as expected, though at the cost of throughput, as can be seen from Table III. TABLE III AVERAGE THROUGHPUT FOR MATCHING HEURISTICS UWM FWM TWM Fairness1 Fairness TABLE IV AVERAGE THROUGHPUT FOR MATCHING HEURISTICS WITHOUT SEQUENTIAL TOPOLOGY CHANGE UWM FWM TWM This metric turns out to be 0 for all other algorithms mentioned in this paper. REFERENCES [1] N. A. Riza, Reconfigurable Optical Wireless, LEOS 99 IEEE, vol.1, pp.70-71, 8-11 Nov [2] Z. Yaqoob, N. A. Riza, Smart Free-Space Optical Interconnects and Communication Links using Agile WDM Transmitters, 2001 Digest of the LEOS Summer Topical Meetings, 30 July-1 Aug [3] S. Suri, M. Waldvogel, D. Bauer, P. R. Warkhede, Profile-Based Routing and Traffic Engineering, Computer Communications, vol. 24(4), pp , March [4] A. Desai, Dynamic Topology Control of Free Space Optical Networks, M.S. Thesis, Department of Electrical Engineering, University of Maryland, [5] P. C. Gurumohan, J. Hui, Topology Design for Free Space Optical Networks, ICCCN [6] Abhishek Kashyap, Kwangil Lee, Mark Shayman, Rollout Algorithms for Integrated Topology Control and Routing in Wireless Optical Backbone Networks, Technical Report, Institute for Systems Research, University of Maryland, [7] M. Garey and D. Johnson, Computers and Intractability: A Guide to the theory of NP-Completeness, Freeman and Company, [8] D. P. Bertsekas, Dynamic Programming and Optimal Control, vol. 1, Athena Scientific, [9] L. Lovász and M. D. Plummer, Matching Theory, North-Holland, [10] R. Ramanathan and R. Rosales-Hain, Topology Control of Multihop Wireless Networks using Transmit Power Adjustment, IEEE Infocom 2000, vol. 2, pp , March [11] Z. Huang, C-C. Shen, C. Srisathapornphat and C. Jaikaeo, Topology Control for Ad Hoc Networks with Directional Antennas, ICCCN 2002, pp , Miami, Florida, October [12] D. Banerjee, B. Mukherjee, Wavelength-routed Optical Networks: Linear Formulation, Resource Budgeting Tradeoffs and a Reconfiguration Study, IEEE/ACM Trans. Networking, vol. 8, pp , Oct [13] K. H. Liu, C. Liu, J. L. Pastor, A. Roy, J. Y. Wei, Performance and Testbed Study of Topology Reconfiguration in IP over WDM, IEEE Transactions on Communications, in press, [14] E. Leonardi, M. Mellia, M. A. Marsan, Algorithms for the Logical Topology Design in WDM All-Optical Networks, Optical Networks Magazine, pp , Jan [15] R. Ramaswami, K. N. Sivarajan, Design of Logical Topologies for Wavelength-Routed optical Networks, IEEE JSAC, pp , Jun [16] L. Li, J. Halpern, P. Bahl, Y-M. Wang and R. Wattenhofer, Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks, ACM Symposium on Principles of Distributed Computing, [17] V. Rodoplu and T. Meng, Minimum Energy Mobile Wireless Networks, IEEE International Conference on Communication, vol. 3, pp , 7-11 June [18] R. Wattenhofer, L. Li, P. Bahl and Y-M. Wang, Distributed Topology Control for Wireless Ad-hoc Networks, IEEE Infocom 2001, pp [19] S. Ruhrup, C. Schindelhauer, K. Volbert and M. Grunewald, Performance of Distributed Algorithms for Topology Control in Wireless Networks, International Parallel and Distributed Processing Symposium, [20] L. Bao and J. J. Garcia-Luna-Aceves, Topology Management in Ad Hoc Networks, ACM Mobihoc, pp , Annapolis, Maryland, June [21] H. Gabow, Implementation of Algorithms for Maximum Matching on Nonbipartite Graphs, Ph.D. thesis, Stanford University, 1973.

Rollout Algorithms for Integrated Topology Control and Routing in Wireless Optical Backbone Networks. by Abhishek Kashyap, Kwangil Lee, Mark Shayman

Rollout Algorithms for Integrated Topology Control and Routing in Wireless Optical Backbone Networks. by Abhishek Kashyap, Kwangil Lee, Mark Shayman TECHNICAL RESEARCH REPORT Rollout Algorithms for Integrated Topology Control and Routing in Wireless Optical Backbone Networks by Abhishek Kashyap, Kwangil Lee, Mark Shayman TR 2003-51 I R INSTITUTE FOR

More information

Routing and Traffic Engineering in Hybrid RF/FSO Networks*

Routing and Traffic Engineering in Hybrid RF/FSO Networks* Routing and Traffic Engineering in Hybrid RF/FSO Networks* Abhishek Kashyap and Mark Shayman Department of Electrical and Computer Engineering, University of Maryland, College Park MD 20742 Email: {kashyap,

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks

Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks Kwangil Lee Department of Electrical and Computer Engineering University of Texas, El Paso, TX 79928, USA. Email:

More information

I R TECHNICAL RESEARCH REPORT. A Local Optimization Algorithm for Logical Topology Design and Traffic Grooming in IP over WDM Networks

I R TECHNICAL RESEARCH REPORT. A Local Optimization Algorithm for Logical Topology Design and Traffic Grooming in IP over WDM Networks TECHNICAL RESEARCH REPORT A Local Optimization Algorithm for Logical Topology Design and Traffic Grooming in IP over WDM Networks by Kwang-Il Lee, Mark Shayman TR 2003-3 I R INSTITUTE FOR SYSTEMS RESEARCH

More information

Maximization of Single Hop Traffic with Greedy Heuristics

Maximization of Single Hop Traffic with Greedy Heuristics Maximization of Single Hop Traffic with Greedy Heuristics Esa Hyytiä Networking Laboratory, HUT, Finland, email: esa@netlab.hut.fi, ABSTRACT Maximization of the single hop traffic has been proposed as

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks Proceedings of the International Conference on Computer and Communication Engineering 008 May 3-5, 008 Kuala Lumpur, Malaysia A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

More information

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks Timothy Hahn, Shen Wan March 5, 2008 Montana State University Computer Science Department Bozeman,

More information

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Amit Shukla, L. Premjit Singh and Raja Datta, Dept. of Computer Science and Engineering, North Eastern Regional Institute

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks Hui Wang, George N. Rouskas Operations Research and Department of Computer Science, North Carolina State University, Raleigh,

More information

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks

Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Fault-tolerant Power-aware Topology Control for Ad-hoc Wireless Networks Harichandan Roy, Shuvo Kumar De, Md.Maniruzzaman, and Ashikur Rahman Department of Computer Science and Engineering Bangladesh University

More information

A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks

A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 2, APRIL 2003 285 A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks Hongyue Zhu, Student Member, IEEE, Hui Zang, Member,

More information

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,

More information

On the Complexity of Broadcast Scheduling. Problem

On the Complexity of Broadcast Scheduling. Problem On the Complexity of Broadcast Scheduling Problem Sergiy Butenko, Clayton Commander and Panos Pardalos Abstract In this paper, a broadcast scheduling problem (BSP) in a time division multiple access (TDMA)

More information

A New Architecture for Multihop Optical Networks

A New Architecture for Multihop Optical Networks A New Architecture for Multihop Optical Networks A. Jaekel 1, S. Bandyopadhyay 1 and A. Sengupta 2 1 School of Computer Science, University of Windsor Windsor, Ontario N9B 3P4 2 Dept. of Computer Science,

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan

More information

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 69-72 EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS Sushil Chaturvedi

More information

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks

Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Design and Analysis of Connected Dominating Set Formation for Topology Control in Wireless Ad Hoc Networks Bo Han and Weijia Jia Department of Computer Science, City University of Hong Kong 3 Tat Chee

More information

On-Line Routing in WDM-TDM Switched Optical Mesh Networks

On-Line Routing in WDM-TDM Switched Optical Mesh Networks On-Line Routing in WDM-TDM Switched Optical Mesh Networks Arun Vishwanath and Weifa Liang Department of Computer Science The Australian National University Canberra, ACT-0200, Australia Email: {arunv,wliang}@cs.anu.edu.au

More information

ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM

ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM ON THE COMPLEXITY OF THE BROADCAST SCHEDULING PROBLEM SERGIY I. BUTENKO, CLAYTON W. COMMANDER, AND PANOS M. PARDALOS Abstract. In this paper, a Broadcast Scheduling Problem (bsp) in a time division multiple

More information

A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS

A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS Nizar Bouabdallah^'^, Emannuel Dotaro^ and Guy Pujolle^ ^Alcatel Research & Innovation, Route de Nozay, F-91460 Marcoussis, France

More information

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Ankitkumar N. Patel, Chengyi Gao, and Jason P. Jue Erik Jonsson School of Engineering and Computer Science The University

More information

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of

More information

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1 Communication Networks I December, Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page Communication Networks I December, Notation G = (V,E) denotes a

More information

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical

More information

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

Virtual Topologies for Multicasting with Multiple Originators in WDM Networks

Virtual Topologies for Multicasting with Multiple Originators in WDM Networks Virtual Topologies for Multicasting with Multiple Originators in WDM Networks Ian Ferrel Adrian Mettler Edward Miller Ran Libeskind-Hadas Department of Computer Science Harvey Mudd College Claremont, California

More information

WIRELESS broadband networks are being increasingly

WIRELESS broadband networks are being increasingly 1960 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 11, NOVEMBER 2006 Joint Channel Assignment and Routing for Throughput Optimization in Multiradio Wireless Mesh Networks Mansoor Alicherry,

More information

Design of CapEx-Efficient IP-over-WDM Network using Auxiliary Matrix based Heuristic

Design of CapEx-Efficient IP-over-WDM Network using Auxiliary Matrix based Heuristic IEEE ANTS 2014 1570023335 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 60 61 62 63 64

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information

Interference Minimization in Topology Control for Ad Hoc Networks

Interference Minimization in Topology Control for Ad Hoc Networks Minimization in Topology Control for Ad Hoc Networks Srinath.K, Venkataramanan.P, Mary Anita Rajam Department of Computer Science and Engineering, College of Engineering, Guindy, Anna University, Chennai,

More information

ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING

ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING Mohamed KOUBAA, Nicolas PUECH, and Maurice GAGNAIRE Telecom Paris - LTCI -

More information

An Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees

An Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees An Algorithm for raffic rooming in WDM Mesh Networks with Dynamically Changing Light-rees Xiaodong Huang, Farid Farahmand, and Jason P. Jue Department of Computer Science Department of Electrical Engineering

More information

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links ANewRoutingProtocolinAdHocNetworks with Unidirectional Links Deepesh Man Shrestha and Young-Bae Ko Graduate School of Information & Communication, Ajou University, South Korea {deepesh, youngko}@ajou.ac.kr

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

Power Aware Routing using Power Control in Ad Hoc Networks

Power Aware Routing using Power Control in Ad Hoc Networks Power Aware Routing using Power Control in Ad Hoc Networks Eun-Sun Jung and Nitin H. Vaidya Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu, Dept.

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

Prolonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN

Prolonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN Prolonging Network Lifetime via Partially Controlled Node Deployment and Adaptive Data Propagation in WSN Fangting Sun, Mark Shayman Department of Electrical and Computer Engineering University of Maryland,

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima, Hiroaki Harai, Shin ichi Arakawa, and Masayuki Murata Graduate School of Information Science and Technology,

More information

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Tibor Fabry-Asztalos, Nilesh Bhide and Krishna M. Sivalingam School of Electrical Engineering &

More information

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS Tzu-Chiang Chiang,, Ching-Hung Yeh, Yueh-Min Huang and Fenglien Lee Department of Engineering Science, National Cheng-Kung University, Taiwan,

More information

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing

Heuristic Algorithms for Multiconstrained Quality-of-Service Routing 244 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 10, NO 2, APRIL 2002 Heuristic Algorithms for Multiconstrained Quality-of-Service Routing Xin Yuan, Member, IEEE Abstract Multiconstrained quality-of-service

More information

Arc Perturbation Algorithms for Optical Network Design

Arc Perturbation Algorithms for Optical Network Design Applied Mathematical Sciences, Vol. 1, 2007, no. 7, 301-310 Arc Perturbation Algorithms for Optical Network Design Zbigniew R. Bogdanowicz Armament Research, Development and Engineering Center Building

More information

Capacity of Grid-Oriented Wireless Mesh Networks

Capacity of Grid-Oriented Wireless Mesh Networks Capacity of Grid-Oriented Wireless Mesh Networks Nadeem Akhtar and Klaus Moessner Centre for Communication Systems Research University of Surrey Guildford, GU2 7H, UK Email: n.akhtar@surrey.ac.uk, k.moessner@surrey.ac.uk

More information

Hierarchical Traffic Grooming Formulations

Hierarchical Traffic Grooming Formulations Hierarchical Traffic Grooming Formulations Hui Wang, George N. Rouskas Operations Research and Department of Computer Science, North Carolina State University, Raleigh, NC 27695-8206 USA Abstract Hierarchical

More information

Online Broadcasting and Multicasting in WDM Networks with Shared Light Splitter Bank

Online Broadcasting and Multicasting in WDM Networks with Shared Light Splitter Bank 1 Online Broadcasting and Multicasting in WDM Networks with Shared Light Splitter Bank Weifa Liang Yuzhen Liu Department of Computer Science Australian National University Canberra, ACT 2, Australia Abstract

More information

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91)

Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: Dept. of Electrical Communication Engg. (ECE) Fax: (+91) Venkatesh Ramaiyan 1.05, Network Engineering Lab Mobile: +91-94482 26130 Dept. of Electrical Communication Engg. (ECE) Fax: (+91)-80-2360 0991 Indian Institute of Science E-mail: rvenkat@ece.iisc.ernet.in

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

Iterative Optimization in VTD to Maximize the Open Capacity of WDM Networks

Iterative Optimization in VTD to Maximize the Open Capacity of WDM Networks Iterative Optimization in VTD to Maximize the Open Capacity of WDM Networks Karcius D.R. Assis, Marcio S. Savasini and Helio Waldman DECOM/FEEC/UNICAMP, CP. 6101, 13083-970 Campinas, SP-BRAZIL Tel: +55-19-37883793,

More information

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme

Efficient Broadcast Algorithms To Reduce number of transmission Based on Probability Scheme Efficient Broadcast s To Reduce number of transmission Based on Probability Scheme S.Tharani, R.Santhosh Abstract Two main approaches to broadcast packets in wireless ad hoc networks are static and dynamic.

More information

Design of Large-Scale Optical Networks Λ

Design of Large-Scale Optical Networks Λ Design of Large-Scale Optical Networks Λ Yufeng Xin, George N. Rouskas, Harry G. Perros Department of Computer Science, North Carolina State University, Raleigh NC 27695 E-mail: fyxin,rouskas,hpg@eos.ncsu.edu

More information

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME

TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME International Journal of Wireless Communications and Networking 3(1), 2011, pp. 89-93 TOPOLOGY CONTROL IN WIRELESS NETWORKS BASED ON CLUSTERING SCHEME A. Wims Magdalene Mary 1 and S. Smys 2 1 PG Scholar,

More information

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point

Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point International Journal of Computational Engineering Research Vol, 03 Issue5 Implementation of an Algorithmic To Improve MCDS Based Routing In Mobile Ad-Hoc Network By Using Articulation Point Shalu Singh

More information

An Integer Programming Approach to Packing Lightpaths on WDM Networks 파장분할다중화망의광경로패킹에대한정수계획해법. 1. Introduction

An Integer Programming Approach to Packing Lightpaths on WDM Networks 파장분할다중화망의광경로패킹에대한정수계획해법. 1. Introduction Journal of the Korean Institute of Industrial Engineers Vol. 32, No. 3, pp. 219-225, September 2006. An Integer Programming Approach to Packing Lightpaths on WDM Networks Kyungsik Lee 1 Taehan Lee 2 Sungsoo

More information

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS

AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS AN ENERGY EFFICIENT AND RELIABLE TWO TIER ROUTING PROTOCOL FOR TOPOLOGY CONTROL IN WIRELESS SENSOR NETWORKS Shivakumar A B 1, Rashmi K R 2, Ananda Babu J. 3 1,2 M.Tech (CSE) Scholar, 3 CSE, Assistant Professor,

More information

DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS

DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS Shinya Ishida Graduate School of Information Science and Technology, Osaka University Machikaneyama 1-32, Toyonaka, Osaka, 0-0043

More information

The 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p.

The 2010 IEEE Wireless Communications and Networking Conference (WCNC), Sydney, Australia, April In Proceedings of WCNC, 2010, p. Title A joint routing and scheduling algorithm for efficient broadcast in wireless mesh networks Author(s) Chiu, HS; Yeung, KL Citation The 2 IEEE Wireless Communications and Networking Conference (WCNC),

More information

Dynamic service Allocation with Protection Path

Dynamic service Allocation with Protection Path www.ijcsi.org 115 Dynamic service Allocation with Protection Path Loay Alzubaidi Department of Computer Engineering & Science, Prince Muhammad bin Fahd University AL-Khobar, Saudi Arabia Abstract Path

More information

Survivable Virtual Topology Routing under Shared Risk Link Groups in WDM Networks

Survivable Virtual Topology Routing under Shared Risk Link Groups in WDM Networks Survivable Virtual Topology Routing under Shared Risk Link Groups in WDM Networks Ajay Todimala and Byrav Ramamurthy Department of Computer Science and Engineering University of Nebraska-Lincoln Lincoln

More information

Automatic Service and Protection Path Computation - A Multiplexing Approach

Automatic Service and Protection Path Computation - A Multiplexing Approach Automatic Service and Protection Path Computation - A Multiplexing Approach Loay Alzubaidi 1, Ammar El Hassan 2, Jaafar Al Ghazo 3 1 Department of Computer Engineering & Science, Prince Muhammad bin Fahd

More information

Optimal network flow allocation

Optimal network flow allocation Optimal network flow allocation EE384Y Project intermediate report Almir Mutapcic and Primoz Skraba Stanford University, Spring 2003-04 May 10, 2004 Contents 1 Introduction 2 2 Background 2 3 Problem statement

More information

Admission Control in Time-Slotted Multihop Mobile Networks

Admission Control in Time-Slotted Multihop Mobile Networks dmission ontrol in Time-Slotted Multihop Mobile Networks Shagun Dusad and nshul Khandelwal Information Networks Laboratory Department of Electrical Engineering Indian Institute of Technology - ombay Mumbai

More information

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity Anastassios Michail Department of Electrical Engineering and Institute for

More information

Max-Flow Protection using Network Coding

Max-Flow Protection using Network Coding Max-Flow Protection using Network Coding Osameh M. Al-Kofahi Department of Computer Engineering Yarmouk University, Irbid, Jordan Ahmed E. Kamal Department of Electrical and Computer Engineering Iowa State

More information

Wavelength-Routed Optical Networks: Linear Formulation, Resource Budgeting Tradeoffs, and a Reconfiguration Study

Wavelength-Routed Optical Networks: Linear Formulation, Resource Budgeting Tradeoffs, and a Reconfiguration Study 598 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 5, OCTOBER 2000 Wavelength-Routed Optical Networks: Linear Formulation, Resource Budgeting Tradeoffs, and a Reconfiguration Study Dhritiman Banerjee

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION Performance Analysis of Network Parameters, Throughput Optimization Using Joint Routing, XOR Routing and Medium Access Control in Wireless Multihop Network 1 Dr. Anuradha M. S., 2 Ms. Anjali kulkarni 1

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

QoS Topology Control for Nonhomogenous Ad Hoc Wireless Networks

QoS Topology Control for Nonhomogenous Ad Hoc Wireless Networks Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking Volume 6, Article ID 8417, Pages 1 1 DOI 1.1155/WCN/6/8417 QoS Topology Control for Nonhomogenous Ad Hoc Wireless

More information

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based

1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST Coding-oblivious routing implies that routing decisions are not made based 1158 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 4, AUGUST 2010 Network Coding-Aware Routing in Wireless Networks Sudipta Sengupta, Senior Member, IEEE, Shravan Rayanchu, and Suman Banerjee, Member,

More information

On minimum m-connected k-dominating set problem in unit disc graphs

On minimum m-connected k-dominating set problem in unit disc graphs J Comb Optim (2008) 16: 99 106 DOI 10.1007/s10878-007-9124-y On minimum m-connected k-dominating set problem in unit disc graphs Weiping Shang Frances Yao Pengjun Wan Xiaodong Hu Published online: 5 December

More information

Designing WDM Optical Networks using Branch-and-Price

Designing WDM Optical Networks using Branch-and-Price Designing WDM Optical Networks using Branch-and-Price S. Raghavan Smith School of Business & Institute for Systems Research University of Maryland College Park, MD 20742 raghavan@umd.edu Daliborka Stanojević

More information

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks

Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Multi-Rate Interference Sensitive and Conflict Aware Multicast in Wireless Ad hoc Networks Asma Ben Hassouna, Hend Koubaa, Farouk Kamoun CRISTAL Laboratory National School of Computer Science ENSI La Manouba,

More information

A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks

A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks Tamkang Journal of Science and Engineering, Vol. 14, No. 1, pp. 81 89 (2011) 81 A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks I-Shyan Hwang 1 *, San-Nan

More information

WDM Network Provisioning

WDM Network Provisioning IO2654 Optical Networking WDM Network Provisioning Paolo Monti Optical Networks Lab (ONLab), Communication Systems Department (COS) http://web.it.kth.se/~pmonti/ Some of the material is taken from the

More information

On Optimal Traffic Grooming in WDM Rings

On Optimal Traffic Grooming in WDM Rings 110 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 On Optimal Traffic Grooming in WDM Rings Rudra Dutta, Student Member, IEEE, and George N. Rouskas, Senior Member, IEEE

More information

An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops

An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops Harsha V. Madhyastha Department of Computer Science and Engineering Indian Institute of Technology, Madras Chennai,

More information

Route and Spectrum Selection in Dynamic Spectrum Networks

Route and Spectrum Selection in Dynamic Spectrum Networks Route and Spectrum Selection in Dynamic Spectrum Networks Qiwei Wang Tsinghua University Beijing, China wangqw04@mails.tsinghua.edu.cn Haitao Zheng Dept. of Computer Science Univ. of California, Santa

More information

Dual Power Management for Network Connectivity in Wireless Sensor Networks

Dual Power Management for Network Connectivity in Wireless Sensor Networks Dual Power Management for Network Connectivity in Wireless Sensor Networks Yanxia Rong, Hongsik Choi and Hyeong-Ah Choi Department of Computer Science George Washington University Washington DC Department

More information

A Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects

A Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER 2003 1081 A Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects Xiaojun Cao, Student Member, IEEE,

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Comparison of Protection Cost at IP or WDM Layer

Comparison of Protection Cost at IP or WDM Layer Comparison of Protection Cost at IP or WDM Layer Mauro Cuna Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it Marco Mellia Politecnico di Tori - Tori, Italy Email: {mellia}@tlc.polito.it

More information

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper)

On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) On Performance Evaluation of Reliable Topology Control Algorithms in Mobile Ad Hoc Networks (Invited Paper) Ngo Duc Thuan 1,, Hiroki Nishiyama 1, Nirwan Ansari 2,andNeiKato 1 1 Graduate School of Information

More information

RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION

RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION Gökhan Mergen and Lang Tong School of Electrical and Computer Engineering Cornell University, Ithaca, NY 14853 {mergen,ltong}@eecornelledu

More information

Energy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks

Energy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks 1 Energy-Efficient Range Assignment in Heterogeneous Wireless Sensor Networks Mihaela Cardei, Mohammad O. Pervaiz, and Ionut Cardei Department of Computer Science and Engineering Florida Atlantic University

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

Topological Design of Multihop Lightwave Networks*

Topological Design of Multihop Lightwave Networks* Topological Design of Multihop Lightwave Networks* Cem Ersoy Computer Engineering Department BogaziCi University,Istanbul, Turkey Shivendra S. Panwar Electrical Engineering Department Polytechnic University,

More information

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks

Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Constructing Connected Dominating Sets with Bounded Diameters in Wireless Networks Yingshu Li Department of Computer Science Georgia State University Atlanta, GA 30303 yli@cs.gsu.edu Donghyun Kim Feng

More information

Abstract. 1. Introduction

Abstract. 1. Introduction PERFORMANCE MODELING OF HYBRID SATELLITE/WIRELESS NETWORKS USING FIXED POINT APPROXIMATION AND SENSITIVITY ANALYSIS OF THE PERFORMANCE MODELS FOR NETWORK DESIGN Ayan Roy-Chowdhury, Electrical and Computer

More information

Routing for Network Capacity Maximization in Energy-constrained Ad-hoc Networks

Routing for Network Capacity Maximization in Energy-constrained Ad-hoc Networks Routing for Network Capacity Maximization in Energy-constrained Ad-hoc Networks Koushik Kar Murali Kodialam T. V. Lakshman Leandros Tassiulas ECSE Department Bell Labs ECE Department Rensselaer Polytechnic

More information

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks

UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks UAMAC: Unidirectional-Link Aware MAC Protocol for Heterogeneous Ad Hoc Networks Sung-Hee Lee, Jong-Mu Choi, and Young-Bae Ko College of Information and Communication, Ajou University, South Korea shlee@dmc.ajou.ac.kr,

More information

Quantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET)

Quantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET) Quantification of Capacity and Transmission Delay for Mobile Ad Hoc Networks (MANET) 1 Syed S. Rizvi, 2 Aasia Riasat, and 3 Khaled M. Elleithy 1, 3 Computer Science and Engineering Department, University

More information

Cost-Effective Traffic Grooming in WDM Rings

Cost-Effective Traffic Grooming in WDM Rings 618 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 5, OCTOBER 2000 Cost-Effective Traffic Grooming in WDM Rings Ornan Gerstel, Member, IEEE, Rajiv Ramaswami, Fellow, IEEE, and Galen H. Sasaki, Member,

More information

Maximization of Time-to-first-failure for Multicasting in Wireless Networks: Optimal Solution

Maximization of Time-to-first-failure for Multicasting in Wireless Networks: Optimal Solution Arindam K. Das, Mohamed El-Sharkawi, Robert J. Marks, Payman Arabshahi and Andrew Gray, "Maximization of Time-to-First-Failure for Multicasting in Wireless Networks : Optimal Solution", Military Communications

More information